Showing 1033–1044 of 1083 results

  • Trip-Point Bit-Line Precharge Sensing Scheme for Single-Ended SRAM

    0 out of 5
    4,500

    Trip-Point Bit-Line Precharge Sensing Scheme for Single-Ended SRAM Abstract? Trip-Point Bit-Line Precharge Sensing Scheme for Single-Ended SRAM. A trip-point bit-line precharge TBP sensing scheme is proposed for high-speed single-ended static random-access memory (SRAM). < Final Year Project 2016 > This TBP scheme mitigates the issues of limited performance, power, sensing margin, and area found in…

  • TRIP: An Interactive Retrieving-Inferring Data Imputation Approach

    0 out of 5
    4,500

    TRIP: An Interactive Retrieving-Inferring Data Imputation Approach Abstract? TRIP: An Interactive Retrieving-Inferring Data Imputation Approach. Data < Final Year Projects 2016 > aims at ?lling in missing attribute values in databases. Most existing imputation methods to string attribute values are inferring-based approaches, which usually fail to reach a high imputation recall by just inferring missing…

  • TRIP: An Interactive Retrieving-Inferring Data Imputation Approach

    0 out of 5
    4,500

    TRIP: An Interactive Retrieving-Inferring Data Imputation Approach Abstract? : TRIP: An Interactive Retrieving-Inferring Data Imputation Approach Data imputation aims at ?lling in missing attribute values in databases. Most existing imputation methods to string attribute values are inferring-based approaches, which usually fail to reach a high imputation recall by just inferring missing values from the complete…

  • Placeholder

    Trust and Compactness in Social Network Groups

    0 out of 5
    4,500

    Trust and Compactness in Social Network Groups Abstract? Trust and Compactness in Social Network Groups. Understanding the dynamics behind group formation and evolution in social networks is considered an instrumental milestone to better describe how individuals gather and form communities, how they enjoy and share the platform contents, how they are driven by their preferences/tastes,…

  • Trust and Compactness in Social Network Groups

    0 out of 5
    4,500

    Trust and Compactness in Social Network Groups Abstract? Trust and Compactness in Social Network Groups. Understanding the dynamics behind group formation and evolution in social networks is considered an instrumental milestone to better describe how individuals gather and form communities, how < Final Year Projects 2016 > enjoy and share the platform contents, how they…

  • Placeholder

    Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage

    0 out of 5
    4,500

    Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage Abstract? Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage.Cloud data storage has provided significant benefits by allowing users to store massive amount of data on demand in a cost-effective manner. To protect the privacy of data stored in the cloud, cryptographic…

  • Placeholder

    Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage

    0 out of 5
    4,500

    Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage Abstract? Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage. Cloud data storage has provided signi?cant bene?ts by allowing users to store massive amount of data on demand in a cost-effective manner. To protect the privacy of data stored in the cloud,…

  • Placeholder

    Trust is Good, Control is Better: Creating Secure Clouds by Continuous Auditing

    0 out of 5
    4,500

    Trust is Good, Control is Better: Creating Secure Clouds by Continuous Auditing Abstract? Cloud service certifications (CSC) attempt to assure a high level of security and compliance. However, considering that cloud services are part of an ever-changing environment, multi-year validity periods may put in doubt reliability of such certifications. We argue that continuous auditing (CA)…

  • Placeholder

    Trusted DB Data Privacy And Data Confidentiality

    0 out of 5
    4,500

    Trusted DB Data Privacy And Data Confidentiality Abstract?Trusted DB Data Privacy And Data Confidentiality, Traditionally, as soon as confidentiality becomes a concern, data are encrypted before outsourcing to a service provider. Any software-based cryptographic constructs then deployed, for server-side query processing on the encrypted data, inherently limit query expressiveness. Here, we introduce TrustedDB, an outsourced…

  • Placeholder

    Trustworthiness management in the social network of things

    0 out of 5
    4,500

    Trustworthiness management in the social network of things Abstract?Trustworthiness management in the social network of things. The integration of social networking concepts into the Internet of things has led to the Social Internet of Things (SIoT) paradigm, according to which objects are capable of establishing social relationships in an autonomous way with respect to their…

  • Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds

    0 out of 5
    4,500

    Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds Abstract? Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds. A major challenging problem for cloud providers is designing ef?cient mechanisms for virtual machine < Final Year Projects 2016 > VM provisioning and allocation. Such mechanisms enable the cloud providers…

  • Placeholder

    Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds

    0 out of 5
    4,500

    Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds Abstract? A major challenging problem for cloud providers is designing efficient mechanisms for virtual machine (VM) provisioning and allocation. Such mechanisms enable the cloud providers to effectively utilize their available resources and obtain higher profits. Recently, cloud providers have introduced auction-based models for…

End of content

End of content